請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/60020
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 王勝德 | |
dc.contributor.author | Shi-Yun Huang | en |
dc.contributor.author | 黃時耘 | zh_TW |
dc.date.accessioned | 2021-06-16T09:51:02Z | - |
dc.date.available | 2022-02-16 | |
dc.date.copyright | 2017-02-16 | |
dc.date.issued | 2017 | |
dc.date.submitted | 2017-01-17 | |
dc.identifier.citation | [1] H. Jiang, F. Shen, S. Chen, K.C. Li, and Y.S. Jeong, “ A secure and scalable storage system for aggregate data in IoT,” Future Generation Computer Systems, vol. 49, pp. 133–141, 2015.
[2] T. Shu, M. Krunz, and S. Liu, “ Secure data collection in wireless sensor networks using randomized dispersive routes,” IEEE Trans. Mobile Comput., vol. 9, pp. 941–954, 2010. [3] A. Liu, Z. Zheng, C. Zhang, and Z. Chen, X. Shen, ' Secure and energy-efficient disjoint multi-path routing for WSNs,' IEEE Trans Veh Technol, vol. 61, pp. 3255–3265, 2012. [4] Wikipedia-Shamir's Secret Sharing [Online]. https://en.wikipedia.org/wiki/Shamir%27s_Secret_Sharing [5] A. Shamir, ' How to share a secret,' Commun. ACM, vol. 22, pp.612–613, 1979. [6] Wikipedia- MQTT [Online]. https://en.wikipedia.org/wiki/MQTT [7] MQ Telemetry Transport [Online]. http://mqtt.org. [8] U. Hunkeler, H. L. Truong, and A. S. Clark, ' MQTT-S – A Publish/Subscribe Protocol For Wireless Sensor Networks,' IEEE Conference on COMSWARE, 2008. [9] Eclipse Mosquitto [Online]. http://projects.eclipse.org/projects/technology.mosquitto [10] A. C. Olivieri, G. Rizzo, and F. Morard, ' A Publish-Subscribe Approach to IoT Integration: The Smart Office Use Case,' IEEE 29th International Conference, 2015. [11] I. M. Yelmo, A. Bikfalvi, R. Cuevas, C. Guerrero, and J. Garcia, “ HP2PSIP: Interconnection of P2PSIP Domains for Global Multimedia Services Based on a Hierarchical DHT Overlay Network,” Computer Networks, vol.53, pp.556–568, 2009. [12] Xu, H, Li, and B, ' Egalitarian stable matching for VM migration in cloud computing,' IEEE, pp. 631–636, 2011. [13] S.F. Abedin, M.G.R. Alam, N.H. Tran, and C. S. Hong, “ A Fog based System Model for Cooperative IoT Node Pairing using Matching Theory,” IEEE Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 309–314, 2015. [14] C. Y. Su, H. J. Chen, T. Laurence, Yang, and K. C. Li, ' A Secure Distributed File System Based on Revised Blakley's Secret Sharing Scheme,' IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012. [15] J. Luo, K. D. Bowers, A. Oprea, and L. Xu, ' Efficient software implementations of large finite fields GF(2n) for secure storage applications,' ACM Transactions on Storage (TOS), vol. 8, TOS Homepage archive, 2012. [16] S. M. Kim, H. S. Choi, and W. S. Rhee, ' IoT home gateway for auto-configuration and management of MQTT devices,' IEEE Conference, Wireless Sensors (ICWiSe), 2015. [17] H. C. Hwang, J. Park, and J. G. Shon, ' Design and Implementation of a Collaboration Messenger System Based on MQTT Protocol,' Advances in Computer Science and Ubiquitous Computing of the series Lecture Notes in Electrical Engineering, vol. 373, pp. 513–519, 2015. [18] L. Harn and C. Lin, “ Detection and identification of cheaters in (t,n) secret sharing scheme,” Designs, Codes and Cryptography, vol. 52, pp. 15–24, 2009. [19] T. E. Wu, and T. S. Wu, “ Cheating detection and cheater identificatim in seaet sharing schemes,” IEE PIOC. Compr. Dzgir. Tech,. Vol. 142, pp.367–369, 1995. [20] M. Tompa, and H. Woll, “ How to share a secret with cheaters,” CRYPTO Lecture Notes in Computer Science, vol. 263, pp. 261–265, 1986. [21] Wikipedia-ZigBee [Online]. https://en.wikipedia.org/wiki/ZigBee [22] Wikipedia-Bluetooth [Online]. https://en.wikipedia.org/wiki/Bluetooth [23] Wikipedia-Wi-Fi [Online]. https://en.wikipedia.org/wiki/Wi-Fi | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/60020 | - |
dc.description.abstract | 最近幾年,隨著物聯網的無線技術與 IC 技術的成熟,各種小型感測裝置出現在我們的生活周遭,人們透過佈署這些感測器在環境中,蒐集各式各樣、數量龐大的資料。有時人們感興趣的資料可能存在於那些遠離都市或鮮少有人們活動的地方,這些地方的感測器可能沒有辦法隨時將蒐集到的資料上傳到網路上讓人使用,在感測器無法上傳資料的這段期間內,系統必須確保感測資料的完整性與安全性。
本論文中提出並實作了一個具有安全性、擴充性與可依賴性的 IoT 資料分散式儲存系統,在此系統下數個到數十個的感測器構成一個叢集,感測器在蒐集資料的同時,會將資料儲存在整個叢集當中並在能夠將資料上傳的時候將該期間內獲取的資料上傳至載具;技術上基本以 Shamir 提出的 secret sharing 演算法作資料分散式加密與還原,並使用 MQTT 協定作為結點間主要的溝通方式,我們並考慮了secret sharing 演算法中對錯誤備份的發現,與根據不同大小的感測器叢集,動態決定產生備份時的門檻值來達到較佳儲存空間的使用等問題。 | zh_TW |
dc.description.abstract | In recent years, with the rapid development of Internet of Things (IoT), wireless and IC technologies, various IoT sensor devices have been deployed in our daily life. Since some sensing devices may not always be connected to the Internet, the sensor data should remain local for a period of time until it is collected by the mobile gateway or the operator. In this paper, we propose and implement an IoT storage system that considers security, scalability, and reliability. The IoT devices are organized into clusters in our system, each consisting of a number of sensing and storage devices. After the sensing device collects the information data, we store the data in the storage device in a distributed manner. When the gateway arrives or the system is eventually online, the system reassembles the data and uploads the data to the destination.
The proposed distributed storage system is based on the Shamir secret sharing scheme and the MQTT communication protocol. We use the secret sharing algorithm in the data distributed encryption and recovery module and use MQTT as the transport protocol. In addition, we consider and propose a solution to the error shares problem in the secret sharing algorithms, and propose a method to dynamically determine the threshold, which makes the system have better storage efficiency. | en |
dc.description.provenance | Made available in DSpace on 2021-06-16T09:51:02Z (GMT). No. of bitstreams: 1 ntu-106-R03921076-1.pdf: 1604392 bytes, checksum: 3b087e9112ef507df95208755f127bd3 (MD5) Previous issue date: 2017 | en |
dc.description.tableofcontents | 誌謝 i
中文摘要 ii ABSTRACT iii CONTENTS iv LIST OF FIGURES vi LIST OF TABLES viii Chapter 1 Introduction 1 Chapter 2 Related work 4 2.1 Secret Sharing Scheme 4 2.2 MQTT protocol 5 Chapter 3 Methodology and Implementation 7 3.1 System overview 7 3.2 MQTT based IoT communication component 9 3.3 Data storage/recovery component 12 3.3.1 Description 12 3.3.2 Shares Generation function 12 3.3.3 Data Retrieval function 14 3.3.4 Analysis 16 3.4 Threshold Decision Method 18 3.4.1 The available range table 19 3.4.2 The relationship between and . 20 3.4.3 Threshold Decision method 21 3.5 Error Shares Detecting method 25 3.5.1 Error Shares problem 25 3.5.2 Error Shares Detection method 26 Chapter 4 Implementation and Result 30 4.1 The Implementation of Threshold Decision method 30 4.1.1 Data format 30 4.1.2 Storage efficiency 31 4.1.3 Time efficiency 35 4.2 The Implementation of Error Shares Detection method 37 Chapter 5 Conclusions and Future work 41 REFERENCES 42 | |
dc.language.iso | en | |
dc.title | 具備動態儲存模式與錯誤節點檢測之物聯網分散式儲存系統 | zh_TW |
dc.title | A secure and reliable distributed storage system with dynamic storage decision and error detection in IoT | en |
dc.type | Thesis | |
dc.date.schoolyear | 105-1 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 雷欽隆,鄧惟中 | |
dc.subject.keyword | 物聯網,MQTT,分散式儲存系統, | zh_TW |
dc.subject.keyword | IoT,MQTT,secret sharing,distributed storage system,security, | en |
dc.relation.page | 44 | |
dc.identifier.doi | 10.6342/NTU201700105 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2017-01-17 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 電機工程學研究所 | zh_TW |
顯示於系所單位: | 電機工程學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-106-1.pdf 目前未授權公開取用 | 1.57 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。